How to Manage App Security Amid Expanding Shadow IT

Protecting endpoint-generated data is the name of the game in cybersecurity today. However, increasing shares of shadow IT devices in the workplace are making app security a more significant challenge.

The post How to Manage App Security Amid Expanding Shadow IT appeared first on Security Intelligence.

Continue reading How to Manage App Security Amid Expanding Shadow IT

Too Costly, Too Bothersome: MFA Adoption Lags in SMB, Consumer Space

We know passwords have become less security protector and more security nightmare. But we continue to use them because they are an easy and cheap form of authentication, not to mention the familiarity. We know how to use passwords, even if remembering… Continue reading Too Costly, Too Bothersome: MFA Adoption Lags in SMB, Consumer Space

Survey: Most CEOs Exfiltrate Intellectual Property When Leaving

When a nation-state such as China steals the intellectual property (IP) of American companies and government, we collectively cry foul and talk about the need to better secure our IP and other data. But what about when corporate leadership is stealing… Continue reading Survey: Most CEOs Exfiltrate Intellectual Property When Leaving

Tech Companies Cool Toward California Consumer Privacy Act

There’s a saying, “As California goes, so goes the nation.” And for good reason: It seems many of the laws and cultural norms we now take for granted originated in California. It’s like the state is America’s test lab. Will we see another California i… Continue reading Tech Companies Cool Toward California Consumer Privacy Act

Digital Strategy Isn’t Meeting Security Needs — Here’s What to Do

IT professionals often find their digital strategy is not keeping pace with the ongoing digital transformation. Accountability needs to be more broadly distributed to secure data adequately.

The post Digital Strategy Isn’t Meeting Security Needs — Here’s What to Do appeared first on Security Intelligence.

Continue reading Digital Strategy Isn’t Meeting Security Needs — Here’s What to Do

Develop a Game Plan to Protect Your Robot’s Identity

Verifying one’s digital identity is tough. If someone has your credentials, it’s very difficult to detect the difference between legitimate access and a breach. But that verification process is even more difficult when it is a robot in your cloud syst… Continue reading Develop a Game Plan to Protect Your Robot’s Identity

Slowly Moving Toward a Future Without Passwords

It seems like every week brings some sort of new password-related frustration. Usually it involves a data breach of some website where passwords weren’t encrypted and are now compromised. But there are other situations that come up, too, like the time… Continue reading Slowly Moving Toward a Future Without Passwords

Are You Prepared for a Malicious Insider Threat?

Earlier this month, Tesla became the poster child of the damage a single malicious insider can do to your company. Tesla CEO Elon Musk sent an email to employees about an employee who allegedly “conducted quite extensive and damaging sabotage” to corp… Continue reading Are You Prepared for a Malicious Insider Threat?

It’s Time to Infuse AI Into Your Endpoint Security Strategy

As the threat landscape evolves to target connected devices, artificial intelligence (AI) and machine learning will become increasingly crucial parts of any organization’s endpoint security strategy.

The post It’s Time to Infuse AI Into Your Endpoint Security Strategy appeared first on Security Intelligence.

Continue reading It’s Time to Infuse AI Into Your Endpoint Security Strategy

Why Privileged Access Management Is Key to Preventing Insider Threats

To protect their networks from insider threats, security teams need greater visibility into privileged accounts held by both employees and third-party vendors.

The post Why Privileged Access Management Is Key to Preventing Insider Threats appeared first on Security Intelligence.

Continue reading Why Privileged Access Management Is Key to Preventing Insider Threats